Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/davidkorczynski/repeconstruct
https://github.com/davidkorczynski/repeconstruct
Last synced: 19 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/davidkorczynski/repeconstruct
- Owner: DavidKorczynski
- Created: 2016-10-23T20:44:50.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2016-10-28T06:58:41.000Z (about 8 years ago)
- Last Synced: 2024-02-11T15:54:56.671Z (9 months ago)
- Language: Python
- Size: 911 KB
- Stars: 90
- Watchers: 16
- Forks: 27
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# RePEconstruct
RePEconstruct is a tool for automatically unpacking binaries and rebuild the binaries in a manner well-suited for further analysis, specially focused on further manual analysis in IDA pro.
**The main idea behind RePEconstruct is to use dynamic analysis for unpacking self-modifying code and also use information from the execution to feed into a disassembler. The disassembler will then automatically rebuild the import table and also locate instructions, that branch to dynamically loaded code, including obfuscated calls as shown in Example 1.** Our disassembler can also produce IDA python scripts for each memory dump it disassembles, which will than add cross-references into the IDA db. The other approach is to have our disassembler try and re-locate instructions and effectively the rebuild binary can be applied to other interactive disassemblers and still leverage results from RePEconstruct.
## First example: rebuild IAT and locate branches to dynamically loaded code
**To run this example you will need to have Capstone *next* branch installed.** Please get this [here](https://github.com/aquynh/capstone/wiki/Next-branch) and don't forget to update your bindings if you have used the main branch of Capstone!**To run this example you will also need PEfile.** Please get this [here](https://github.com/erocarrera/pefile).
In this example we use a dump from the dynamic tracer to show the use of our the static component which will rebuild the import table and also locate any obfuscated calls in the dump.
The dump we will be using is a memory dump produced by our dynamic analysis component and the initial file is a binary that was packed with the Petite packer. We will now use this dump as input to our static analyser and view the output in IDA pro.
The file *PEtite_example/entire_unpacked-3* is the dump of the third wave of self-modifying code produced by a packed Petite example. Note that this is merely a toy example produced by a synthetic application!
In the binary, you will see at address **0x40f031** an obfuscated call that was used by the packed binary which at runtime constituted a call to dynamically loaded code. However, this is not resolved by IDA pro when we load a given memory dump into the disassembler. The exact purpose of RePEconstruct is to automatically thwart self-modifying code and find calls like this.
Simply execute main.py and you will see the result! The result is composed of two files: *reconstructedDirect.exe* and *ida_script.py*. *reconstructedDirect* is the binary file with instructions relocated where possible, and the *ida_script.py* is an IDA python script which setup cross-references and also comments.
Before picture:
![alt tag](http://imageshack.com/a/img921/6003/nAOlGQ.png)After picture (loaded reconstructedDirect into IDA and also run the ida_script.py in IDA):
![alt tag](http://imageshack.com/a/img921/7296/TjrV2k.png)The main.py should be easy to follow and see what is needed to run any type of binary through the disassembler!
## Second example: automatically unpacking a packed application
**To run this example you will need DynamoRIO 6.1.1-3.** You can get this [here](https://github.com/DynamoRIO/dynamorio/wiki/Downloads)In this example we will use the dynamic analysis component to unpack a simple application that was packed with the Petite packer.
Simply run the command from the main DynamoRIO folder:
```
bin32\drrun.exe -max_bb_instrs 128 -c unpacker.dll –Petite_packed.exe
```Note that you must have a folder namer *Refactor_output* in the folder of which you are executing this command. Also note that *unpacker.dll* is the DLL from *Tracer/Pre_compiled_dll/unpacker.dll* and the *Petite_packed.exe* is the binary given in *Tracer/Example_of_packed_file/Petite_packed.exe*
**This experiment was done on a Windows 32-bit SP3 VM, with DynamoRIO 6.1.1-3**
The result from the unpacker is generated in the *Refactor_output folder.* Here you will find several files:
*entire_unpacked-x* means a memory dump of the *x*'th layer of self-modifying code that has been prepared for IAT rebuilding. Specifically, this means we have constructed a new section where we will build the new IAT, as done in the example just above.*entire_unpacked_clean-x* are files that are clean memory dumps of each layer of self-modifying code. These are not used by the static disassembler, but are provided in case needed.
*exports_wave-x* are files that contain addresses of dynamically loaded modules and the functions they export. This is used by the static rebuilder to map which instructions branch to dynamically loaded functions.
The files *trace_output* amd *wave_entrypoints* are also used by the static rebuilder. The main.py file from the example above shows in a simple manner how they are to be used!
## Publications
The tool is described in the 2016 MALWARE paper *RePEconstruct: reconstructing packed binaries with self-modifying code and import table destruction* by David Korczynski.